CVE-2025-9560: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in extendthemes Colibri Page Builder
The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's colibri_newsletter shortcode in all versions up to, and including, 1.0.334 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI Analysis
Technical Summary
CVE-2025-9560 identifies a stored cross-site scripting vulnerability in the Colibri Page Builder plugin for WordPress, specifically in the colibri_newsletter shortcode. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), where user-supplied attributes are not adequately sanitized or escaped before rendering. As a result, authenticated users with contributor-level access or higher can inject arbitrary JavaScript code into pages. When other users visit these pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions within the context of the affected site. The vulnerability affects all versions up to and including 1.0.334. The CVSS 3.1 base score of 6.4 reflects a medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change due to the impact on other users. No public exploits are currently known, and no official patches have been released at the time of this report. The vulnerability's exploitation requires authenticated access, limiting exposure to sites with multiple contributors or editors. However, the widespread use of WordPress and the popularity of the Colibri Page Builder plugin increase the potential attack surface. The stored nature of the XSS makes it persistent and more dangerous than reflected XSS, as injected scripts remain on the server and affect all visitors to the compromised pages.
Potential Impact
For European organizations, this vulnerability poses risks primarily to websites and web applications built on WordPress using the Colibri Page Builder plugin. Exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware via injected scripts. This can damage organizational reputation, lead to data breaches involving user credentials or personal data, and disrupt business operations. Organizations with multiple content contributors are at higher risk since the vulnerability requires contributor-level access. Given the extensive use of WordPress in Europe for corporate, governmental, and e-commerce sites, the impact could be significant, especially for sectors relying on web presence for customer engagement or critical services. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect users beyond the initial attacker, increasing the potential damage. The absence of known exploits suggests limited current active attacks, but the medium severity and ease of exploitation by insiders or compromised accounts warrant proactive mitigation.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions on WordPress sites using the Colibri Page Builder plugin, restricting contributor or higher privileges to trusted users only. Implement strict content review and approval workflows to detect and prevent malicious shortcode usage. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to WordPress shortcodes. Monitor logs and content changes for suspicious activity related to the colibri_newsletter shortcode. Until an official patch is released, consider disabling or removing the Colibri Page Builder plugin if feasible. Educate content contributors about the risks of injecting untrusted code or content. Use security plugins that provide input sanitization and output escaping enhancements. Regularly update WordPress core and plugins to incorporate security fixes promptly. Finally, conduct penetration testing focused on stored XSS vectors to identify any residual vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-9560: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in extendthemes Colibri Page Builder
Description
The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's colibri_newsletter shortcode in all versions up to, and including, 1.0.334 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
AI-Powered Analysis
Technical Analysis
CVE-2025-9560 identifies a stored cross-site scripting vulnerability in the Colibri Page Builder plugin for WordPress, specifically in the colibri_newsletter shortcode. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), where user-supplied attributes are not adequately sanitized or escaped before rendering. As a result, authenticated users with contributor-level access or higher can inject arbitrary JavaScript code into pages. When other users visit these pages, the malicious scripts execute in their browsers, potentially compromising session tokens, redirecting users, or performing unauthorized actions within the context of the affected site. The vulnerability affects all versions up to and including 1.0.334. The CVSS 3.1 base score of 6.4 reflects a medium severity, with an attack vector of network (remote), low attack complexity, requiring privileges (contributor or above), no user interaction, and a scope change due to the impact on other users. No public exploits are currently known, and no official patches have been released at the time of this report. The vulnerability's exploitation requires authenticated access, limiting exposure to sites with multiple contributors or editors. However, the widespread use of WordPress and the popularity of the Colibri Page Builder plugin increase the potential attack surface. The stored nature of the XSS makes it persistent and more dangerous than reflected XSS, as injected scripts remain on the server and affect all visitors to the compromised pages.
Potential Impact
For European organizations, this vulnerability poses risks primarily to websites and web applications built on WordPress using the Colibri Page Builder plugin. Exploitation can lead to session hijacking, unauthorized actions performed on behalf of users, defacement, or distribution of malware via injected scripts. This can damage organizational reputation, lead to data breaches involving user credentials or personal data, and disrupt business operations. Organizations with multiple content contributors are at higher risk since the vulnerability requires contributor-level access. Given the extensive use of WordPress in Europe for corporate, governmental, and e-commerce sites, the impact could be significant, especially for sectors relying on web presence for customer engagement or critical services. Additionally, the scope change in the CVSS vector indicates that the vulnerability can affect users beyond the initial attacker, increasing the potential damage. The absence of known exploits suggests limited current active attacks, but the medium severity and ease of exploitation by insiders or compromised accounts warrant proactive mitigation.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions on WordPress sites using the Colibri Page Builder plugin, restricting contributor or higher privileges to trusted users only. Implement strict content review and approval workflows to detect and prevent malicious shortcode usage. Employ web application firewalls (WAFs) with rules targeting XSS payloads specific to WordPress shortcodes. Monitor logs and content changes for suspicious activity related to the colibri_newsletter shortcode. Until an official patch is released, consider disabling or removing the Colibri Page Builder plugin if feasible. Educate content contributors about the risks of injecting untrusted code or content. Use security plugins that provide input sanitization and output escaping enhancements. Regularly update WordPress core and plugins to incorporate security fixes promptly. Finally, conduct penetration testing focused on stored XSS vectors to identify any residual vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-27T20:15:51.490Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e9c57e54cfe91d8fee2b9c
Added to database: 10/11/2025, 2:48:30 AM
Last enriched: 10/11/2025, 3:03:28 AM
Last updated: 10/11/2025, 8:27:52 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-9496: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shortpixel Enable Media Replace
MediumCVE-2025-9196: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-11533: CWE-269 Improper Privilege Management in ApusTheme WP Freeio
CriticalCVE-2025-11197: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in dartiss Draft List
MediumCVE-2025-10185: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in webaways NEX-Forms – Ultimate Forms Plugin for WordPress
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.